{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,8]],"date-time":"2025-01-08T23:10:06Z","timestamp":1736377806019,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540340751"},{"type":"electronic","value":"9783540340768"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11751595_109","type":"book-chapter","created":{"date-parts":[[2006,5,11]],"date-time":"2006-05-11T14:27:59Z","timestamp":1147357679000},"page":"1044-1053","source":"Crossref","is-referenced-by-count":9,"title":["A Comparative Study of Proposals for Establishing Security Requirements for the Development of Secure Information Systems"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Mellado","sequence":"first","affiliation":[]},{"given":"Eduardo","family":"Fern\u00e1ndez-Medina","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Piattini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"109_CR1","unstructured":"Alberts, C.J., Behrens, S.G., Pethia, R.D., Wilson, W.R.: OCTAVE Framework, Version 1.0. Networked Systems Survivability Program, p. 84 (1999)"},{"issue":"1","key":"109_CR2","first-page":"1","volume":"4","author":"R. Baskeville","year":"1992","unstructured":"Baskeville, R.: The development duality of information systems security. Journal of Management Systems\u00a04(1), 1\u201312 (1992)","journal-title":"Journal of Management Systems"},{"key":"109_CR3","doi-asserted-by":"crossref","unstructured":"Boehm, B., Turner, R.: Observations on Balancing Discipline and Agility. In: Agile Development Conference (ADC 2003), p. 32 (2003)","DOI":"10.1109\/ADC.2003.1231450"},{"key":"109_CR4","doi-asserted-by":"crossref","unstructured":"Boehm, B., Turner, R.: Balancing Agility and Discipline: Evaluating and Integrating Agile and Plan-Driven Methods. In: ICSE 2004, pp. 718\u2013719 (2004)","DOI":"10.1109\/ICSE.2004.1317503"},{"key":"109_CR5","doi-asserted-by":"crossref","unstructured":"Breu, R., Burger, K., Hafner, M., Popp, G.: Towards a Systematic Development of Secure Systems. In: WOSIS 2004 (2004)","DOI":"10.1201\/1086\/44530.13.3.20040701\/83064.2"},{"key":"109_CR6","unstructured":"Breu, R., Innerhofer\u2013Oberperfler, F.: Model based business driven IT security analysis. In: SREIS 2005 (2005)"},{"key":"109_CR7","volume-title":"Objects, Components & Frameworks with UML: The Catalysis Approach","author":"D.F. D\u2019Souza","year":"1998","unstructured":"D\u2019Souza, D.F., Wills, A.C.: Objects, Components & Frameworks with UML: The Catalysis Approach. Addison-Wesley Publishing Company, Reading (1998)"},{"issue":"1","key":"109_CR8","doi-asserted-by":"publisher","first-page":"53","DOI":"10.5381\/jot.2003.2.1.c6","volume":"2","author":"D.G. Firesmith","year":"2003","unstructured":"Firesmith, D.G.: Engineering Security Requirements. Journal of Object Technology\u00a02(1), 53\u201368 (2003)","journal-title":"Journal of Object Technology"},{"key":"109_CR9","doi-asserted-by":"crossref","unstructured":"Firesmith, D.G.: Security Use Cases. Journal of Object Technology, 53\u201364 (2003)","DOI":"10.5381\/jot.2003.2.3.c6"},{"key":"109_CR10","doi-asserted-by":"crossref","unstructured":"Firesmith, D.G.: Specifying Reusable Security Requirements. Journal of Object Technology, 61\u201375 (2004)","DOI":"10.5381\/jot.2004.3.1.c6"},{"key":"109_CR11","unstructured":"Guti\u00e9rrez, C., Moros, B., Toval, A., Fern\u00e1ndez-Medina, E., Piattini, M.: Security Requirements for Web Services based on SIREN. In: Symposium on Requirements Engineer-ing for Information Security (SREIS 2005), together with the 13th IEEE International Requirements Engineering Conference, RE 2005 (2005)"},{"key":"109_CR12","volume-title":"The Unified Software Development Process","author":"I. Jacobson","year":"1999","unstructured":"Jacobson, I., Booch, G., Rumbaugh, J.: The Unified Software Development Process. Addison-Wesley Longman Inc., Amsterdam (1999)"},{"key":"109_CR13","unstructured":"Jennex, M.E.: Modeling security requirements for information systems development. In: SREIS 2005 (2005)"},{"key":"109_CR14","first-page":"309","volume-title":"Secure Systems Development with UML","author":"J. J\u00fcrjens","year":"2005","unstructured":"J\u00fcrjens, J.: Secure Systems Development with UML, p. 309. Springer, Heidelberg (2005)"},{"key":"109_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1007\/11424857_84","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2005","author":"H.-K. Kim","year":"2005","unstructured":"Kim, H.-K.: Automatic Translation Form Requirements Model into Use Cases Modeling on UML. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Lagan\u00e1, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol.\u00a03482, pp. 769\u2013777. Springer, Heidelberg (2005)"},{"key":"109_CR16","unstructured":"Kotonya, G., Sommerville, I.: Requirements Engineering Process and Techniques (1998)"},{"key":"109_CR17","doi-asserted-by":"crossref","unstructured":"Liu, L., Yu, E., Mylopoulus, J.: Security and Privacy Requirements Analysis within Social Setting. In: 11th IEEE International Requirements Engineering Conference (2003)","DOI":"10.1109\/ICRE.2003.1232746"},{"key":"109_CR18","doi-asserted-by":"crossref","unstructured":"McDermott, J., Fox, C.: Using Abuse Case Models for Security Requirements Analysis. In: Annual Computer Security Applications Conference, Phoenix, Arizona (1999)","DOI":"10.1109\/CSAC.1999.816013"},{"key":"109_CR19","unstructured":"Mouratidis, H., Giorgini, P., Manson, G., Philp, I.: A Natural Extension of Tropos Methodology for Modelling Security. In: Workshop on Agent-oriented methodologies, OOPSLA 2002, Seattle, WA, USA (2003)"},{"key":"109_CR20","unstructured":"Myagmar, S., Lee, A.J., Yurcik, W.: Threat Modeling as a Basis for Security Requirements. In: SREIS 2005 (2005)"},{"key":"109_CR21","unstructured":"Peeters, J.: Agile Security Requirements Engineering. In: SREIS 2005 (2005)"},{"key":"109_CR22","doi-asserted-by":"crossref","unstructured":"Popp, G., J\u00fcrjens, J., Wimmel, G., Breu, R.: Security-Critical System Development with Extended Use Cases. In: 10th Asia-Pacific Software Engineering Conference, pp. 478\u2013487 (2003)","DOI":"10.1109\/APSEC.2003.1254403"},{"key":"109_CR23","doi-asserted-by":"crossref","unstructured":"Siponen, M., Baskerville, R.: A new paradigm for adding security into IS development methods. In: 8th Annual Working Conference on Information Security Management and Small Systems Security (2001)","DOI":"10.1007\/0-306-47007-1_8"},{"key":"109_CR24","doi-asserted-by":"crossref","unstructured":"Toval, A., Nicol\u00e1s, J., Moros, B., Garc\u00eda, F.: Requirements Reuse for Improving In-formation Systems Security: A Practitioner\u2019s Approach. Requirements Engineering Journal, 205\u2013219 (2001)","DOI":"10.1007\/PL00010360"},{"key":"109_CR25","volume-title":"Proceedings of the 30th annual ACM SIGUCCS conference on User services","author":"J.P. Walton","year":"2002","unstructured":"Walton, J.P.: Developing a Enterprise Information Security Policy. In: Proceedings of the 30th annual ACM SIGUCCS conference on User services. ACM Press, New York (2002)"},{"key":"109_CR26","doi-asserted-by":"crossref","unstructured":"Yu, E.: Towards Modelling and Reasoning Support for Early-Phase Requirements Engineering. In: 3rd IEEE International Symposium on Requirements Engineering (RE 1997), pp. 226\u2013235 (1997)","DOI":"10.1109\/ISRE.1997.566873"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications - ICCSA 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11751595_109.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,8]],"date-time":"2025-01-08T22:34:29Z","timestamp":1736375669000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11751595_109"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540340751","9783540340768"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/11751595_109","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}